Mozilla Foundation Security Advisory 2024-43
Security Vulnerabilities fixed in Thunderbird 128.2
- Announced
- September 3, 2024
- Impact
- high
- Products
- Thunderbird
- Fixed in
-
- Thunderbird 128.2
In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potential risks in browser or browser-like contexts.
#CVE-2024-8394: Crash when aborting verification of OTR chat
- Reporter
- Thunderbird Team
- Impact
- high
Description
When aborting the verification of an OTR chat session, an attacker could have caused a use-after-free bug leading to a potentially exploitable crash.
References
#CVE-2024-8385: WASM type confusion involving ArrayTypes
- Reporter
- Seunghyun Lee
- Impact
- high
Description
A difference in the handling of StructFields and ArrayTypes in WASM could be used to trigger an exploitable type confusion vulnerability.
References
#CVE-2024-8381: Type confusion when looking up a property name in a "with" block
- Reporter
- Nils Bars
- Impact
- high
Description
A potentially exploitable type confusion could be triggered when looking up a property name on an object being used as the with
environment.
References
#CVE-2024-8382: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran
- Reporter
- Gregory Pappas
- Impact
- moderate
Description
Internal browser event interfaces were exposed to web content when privileged EventHandler listener callbacks ran for those events. Web content that tried to use those interfaces would not be able to use them with elevated privileges, but their presence would indicate certain browser features had been used, such as when a user opened the Dev Tools console.
References
#CVE-2024-8384: Garbage collection could mis-color cross-compartment objects in OOM conditions
- Reporter
- the Mozilla Fuzzing Team
- Impact
- moderate
Description
The JavaScript garbage collector could mis-color cross-compartment objects if OOM conditions were detected at the right point between two passes. This could have led to memory corruption.
References
#CVE-2024-8386: SelectElements could be shown over another site if popups are allowed
- Reporter
- Shaheen Fazim, Hafiizh
- Impact
- low
Description
If a site had been granted the permission to open popup windows, it could cause Select elements to appear on top of another site to perform a spoofing attack.
References
#CVE-2024-8387: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2
- Reporter
- the Mozilla Fuzzing Team, Yury Delendik
- Impact
- high
Description
Memory safety bugs present in Firefox 129, Firefox ESR 128.1, and Thunderbird 128.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.